From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 49057 invoked by alias); 17 Jun 2016 10:16:39 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 49040 invoked by uid 89); 17 Jun 2016 10:16:38 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 spammy=HERE X-HELO: mail-pf0-f179.google.com Received: from mail-pf0-f179.google.com (HELO mail-pf0-f179.google.com) (209.85.192.179) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES128-GCM-SHA256 encrypted) ESMTPS; Fri, 17 Jun 2016 10:16:37 +0000 Received: by mail-pf0-f179.google.com with SMTP id h14so14463887pfe.1 for ; Fri, 17 Jun 2016 03:16:37 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id; bh=atqjLq9wcnWGRT7iM+kXyxe+rCu5vdPSlJuW9reqICY=; b=VjVoYbQINZyzpAjV+gwkYDZOZgiBt8Ws1+TyraM/Se5r/R2JFI9dfE7XyWp4Jh/VvH N1480W7wHr5ToSsbkhG0dAzqwkGnwMayWROWaPb+vrBTJmH9KEY+5FiYNztteKfZdXSQ XHuMF7jWPcr+/tFamkC/aRNGKhT2OXcy7blHCTxsyq6NMrO1fM39xx8EILrdQML6HWRP SkGejrAVS7An0a4K08vSsoIf9wUVA5qpFVyofUYMkj7Z22uDT4r10RYLFf5/mIQ7B5l4 HkJaJ/H+PXWGENOdnghMAKnpXlqtNhbpzDDULFmKTnDBVntIYZwxLBHty3fso1OGMYEQ Vbpg== X-Gm-Message-State: ALyK8tJs/vLfTAire/Gi1eV50v9Bybscts2GVu37ST8TRPjir+RmJn0Lkb81nJ5ZpJLABA== X-Received: by 10.98.95.197 with SMTP id t188mr1630718pfb.162.1466158595415; Fri, 17 Jun 2016 03:16:35 -0700 (PDT) Received: from E107787-LIN.cambridge.arm.com (gcc113.osuosl.org. [140.211.9.71]) by smtp.gmail.com with ESMTPSA id z88sm39535357pfa.59.2016.06.17.03.16.34 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 17 Jun 2016 03:16:34 -0700 (PDT) From: Yao Qi X-Google-Original-From: Yao Qi To: gdb-patches@sourceware.org Subject: [PATCH 0/4] Tweak catch syscall for remote Date: Fri, 17 Jun 2016 10:16:00 -0000 Message-Id: <1466158585-21833-1-git-send-email-yao.qi@linaro.org> X-IsSubscribed: yes X-SW-Source: 2016-06/txt/msg00291.txt.bz2 I see some test fails in catch-syscall.exp on aarch64 with native-gdbserver. This patch series add catch syscall in remote for both aarch64-linux and arm-linux. Currently, only catch syscall for remote is only supported on x86, but the test is run on other targets. Patch 1 fixes the issue in catch-sysca.exp about probing the catch syscall support. Patch 2 removes one redundant parameter in linux_target_ops.get_syscall_trapinfo. Patch 3 and 4 adds support for aarch64-linux and arm-linux respectively. *** BLURB HERE *** Yao Qi (4): Probe catch syscall support Remove parameter sysret from linux_target_ops.get_syscall_trapinfo Implement get_syscall_trapinfo for aarch64-linux Implement get_syscall_trapinfo for arm-linux gdb/gdbserver/linux-aarch64-low.c | 19 ++++++++++++++ gdb/gdbserver/linux-arm-low.c | 33 +++++++++++++++++++++++- gdb/gdbserver/linux-low.c | 23 ++++++----------- gdb/gdbserver/linux-low.h | 8 +++--- gdb/gdbserver/linux-x86-low.c | 10 ++------ gdb/testsuite/gdb.base/catch-syscall.exp | 43 +++++++++++++++++++++----------- 6 files changed, 93 insertions(+), 43 deletions(-) -- 1.9.1